Multi-factorauthentication(MFA)MalwareTraining12CharacterPasswordsPasswordSafe ToolRansomwareVirusExploitPersonallyidentifiableinformation(PII)ScreenlockpolicyCompromiseSoftwareupdatesEncryptionAwarenessTrainingBreachWormZero-dayIntrusionSpearphishingWhalephishingVulnerabilityExtorsionDarkwebPhishingMulti-factorauthentication(MFA)MalwareTraining12CharacterPasswordsPasswordSafe ToolRansomwareVirusExploitPersonallyidentifiableinformation(PII)ScreenlockpolicyCompromiseSoftwareupdatesEncryptionAwarenessTrainingBreachWormZero-dayIntrusionSpearphishingWhalephishingVulnerabilityExtorsionDarkwebPhishing

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Multi-factor authentication (MFA)
  2. Malware
  3. Training
  4. 12 Character Passwords
  5. Password Safe Tool
  6. Ransomware
  7. Virus
  8. Exploit
  9. Personally identifiable information (PII)
  10. Screen lock policy
  11. Compromise
  12. Software updates
  13. Encryption
  14. Awareness Training
  15. Breach
  16. Worm
  17. Zero-day
  18. Intrusion
  19. Spear phishing
  20. Whale phishing
  21. Vulnerability
  22. Extorsion
  23. Dark web
  24. Phishing